-----BEGIN PGP SIGNATURE-----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=oXdH
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7626-2
July 09, 2025
git regression
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
USN-7626-1 introduced a regression in Git.
Software Description:
- git: fast, scalable, distributed revision control system
Details:
USN-7626-1 fixed vulnerabilities in Git. The update introduced a regression
in gitk and git-gui. This update reverts the corresponding fixes for
CVE-2025-27613 and CVE-2025-46835 pending further investigation.
We apologize for the inconvenience.
Original advisory details:
Avi Halachmi discovered that Git incorrectly managed file modification
constraints with Gitk. An attacker could possibly use this issue to create
or write to arbitrary files on the system. (CVE-2025-27613)
Avi Halachmi discovered that Git incorrectly handled arguments when
invoking the Gitk utility. If a user were tricked into cloning a malicious
Git repository, an attacker could possibly use this issue to run arbitrary
commands. This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and
Ubuntu 25.04. (CVE-2025-27614)
Johannes Sixt discovered that Git incorrectly managed file modification
constraints with Git GUI. If a user were tricked into editing a file in a
malicious Git repository, an attacker could possibly use this issue to
create or write to arbitrary files on the system. (CVE-2025-46835)
David Leadbeater discovered that Git incorrectly stripped CRLF characters
when editing configuration files. An attacker could possibly use this
issue to execute arbitrary code. (CVE-2025-48384)
David Leadbeater discovered that Git incorrectly handled verification when
fetching remote Git repositories. An attacker could possibly use this
issue to perform protocol injection, leading to arbitrary code execution.
This issue only affected Ubuntu 24.04 LTS, Ubuntu 24.10, and Ubuntu 25.04.
(CVE-2025-48385)
David Leadbeater discovered that Git incorrectly handled memory with the
wincred credential helper. An attacker could possibly use this issue to
cause a denial of service. (CVE-2025-48386)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS
git-gui 1:2.34.1-1ubuntu1.14
gitk 1:2.34.1-1ubuntu1.14
Ubuntu 20.04 LTS
git-gui 1:2.25.1-1ubuntu3.14+esm2
Available with Ubuntu Pro
gitk 1:2.25.1-1ubuntu3.14+esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
git-gui 1:2.17.1-1ubuntu0.18+esm3
Available with Ubuntu Pro
gitk 1:2.17.1-1ubuntu0.18+esm3
Available with Ubuntu Pro
Ubuntu 16.04 LTS
git-gui 1:2.7.4-0ubuntu1.10+esm10
Available with Ubuntu Pro
gitk 1:2.7.4-0ubuntu1.10+esm10
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7626-2
https://ubuntu.com/security/notices/USN-7626-1
https://launchpad.net/bugs/2116251
Package Information:
https://launchpad.net/ubuntu/+source/git/1:2.34.1-1ubuntu1.14
No comments:
Post a Comment